메뉴 건너뛰기




Volumn , Issue , 2008, Pages 744-748

CPFP: An efficient key management scheme for large scale personal networks

Author keywords

Certified PN formation protocol (CPFP); Key management; Personal networks (PN)

Indexed keywords

CRYPTOGRAPHY;

EID: 51649098804     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISWPC.2008.4556309     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 2
    • 51649088155 scopus 로고    scopus 로고
    • Conceptual Secure PN Architecture
    • December
    • M Petrova et al., "Conceptual Secure PN Architecture", IST MAGNET deliverable D2.1.1, December 2004, http://www.istmagnet.org/GetAsset. action?contentId-939330&assetId=939344
    • (2004) IST MAGNET deliverable
    • Petrova, M.1
  • 3
    • 33751508709 scopus 로고    scopus 로고
    • Recommendation for Key Management - Part 1: General (Revised)
    • NIST Special Publication 800-57, May
    • NIST Special Publication 800-57, "Recommendation for Key Management - Part 1: General (Revised)", May 2006, http://csrc.nist.gov/publications/ nistpubs/800-57/SP800-57-Part1.pdf
    • (2006)
  • 4
    • 33750922353 scopus 로고    scopus 로고
    • Final version of the Network-Level Security Architecture Specification
    • IST MAGNET deliverable D4.3.2, Feburary
    • S. Mirzadeh et al. , "Final version of the Network-Level Security Architecture Specification", IST MAGNET deliverable D4.3.2, Feburary 2005, http://www.istmagnet.org/GetAsset.action?contentId=942902&assetId=943012
    • (2005)
    • Mirzadeh, S.1
  • 5
    • 33646048509 scopus 로고    scopus 로고
    • The personal PKI
    • C. J. Mitchell, editor, chapter 3, IEE, London, UK
    • C. J. Mitchell and R. Schaffelhofer. The personal PKI. In. C. J. Mitchell, editor, Security for Mobility, chapter 3, pages 35-61. IEE, London, UK, 2004.
    • (2004) Security for Mobility , pp. 35-61
    • Mitchell, C.J.1    Schaffelhofer, R.2
  • 7
    • 51649102273 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/MQV
  • 8
    • 2642522597 scopus 로고    scopus 로고
    • Talking To Strangers: Authentication in Ad-Hoc Wireless Networks
    • Technical report, Xerox Palo Alto Research Center, Palo Alto
    • D.Balfanz, D.K.Smetters, P.Stewart and H.Chi Wong. "Talking To Strangers: Authentication in Ad-Hoc Wireless Networks". Technical report, Xerox Palo Alto Research Center, Palo Alto, 2002, http://www2.parc.com/csl/ members/balfanz/publications/loclim.pdf
    • (2002)
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Chi Wong, H.4
  • 9
    • 51649099709 scopus 로고    scopus 로고
    • NIST FIPS PUB 186-2, DIGITAL SIGNATURE STANDARD (DSS), January 2000, http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
    • NIST FIPS PUB 186-2, DIGITAL SIGNATURE STANDARD (DSS), January 2000, http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
  • 11
    • 51649124238 scopus 로고    scopus 로고
    • Fact Sheet NSA Suite B Cryptography, http://www.nsa.gov/ia/industry/ cryptosuiteb.cfm?MenuID=10,2,7
    • Fact Sheet NSA Suite B Cryptography, http://www.nsa.gov/ia/industry/ cryptosuiteb.cfm?MenuID=10,2,7
  • 13
    • 51649091627 scopus 로고    scopus 로고
    • Specification of PN networking and security components
    • December
    • M Jacobsson et al., "Specification of PN networking and security components", IST-MAGNET Beyond deliverable D2.3.1, December 2006, http://www.istmagnet.org/GetAsset.action?contentId=1111179&assetId=2253549
    • (2006) IST-MAGNET Beyond deliverable
    • Jacobsson, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.